quiz 6 - Flashcards
Authentication and Account Management (lecture 8 and 11)??
________________ (BCP) is a strategic document that provides alternative
modes of operation for business activities
three goals:
* Business recovery planning
* Crisis management and communications
* Disaster recovery
_________________(COOP) is a federal initiative to encourage organizations
to address how critical operations will continue under a broad range of negative
circumstances
_____________(BIA)
* A BIA identifies business functions and quantifies the impact a loss of these functions may
have on business operations
A BIA will help determine the _________________, which is the activity that serves
as the core purpose of the enterprise
- A BIA can also help in the ____________ that support the mission-
essential function - Identifying a ______________
business continuity plan
Continuity of operation planning
Business Impact Analysis
mission-essential function
identification of critical system
single point of failure
When users create passwords, a one-way hash algorithm creates a message ______ of the password
Attackers work to steal the file of ___ ___. Which can be used to impersonate the user.
___ ___ can also be used, create known digests known as ___
digest (or hash)
password digests
password cracker, candidates
A ____ ____attack selects one or a few common passwords and then enters the same password when trying to login to several user accounts
password spraying
In an ___________________, every possible combination of letters, numbers, and characters used to create encrypted passwords are matched against the stolen hash file
- In an _________________, the same account is continuously attacked (called pounded) by entering different passwords
an _______________ uses the stolen hash file
* This is the slowest yet most thorough method
automated brute force attack
online brute force attack
offline brute force attacks
A _____ _____ conducts a statistical analysis on the stolen passwords that is used to create a mask to break the largest number of passwords
3 steps
rule attack
- sample of stolen password plaintext file is obtained
- statistical analysis is performed to determine the length and characters of the passwords
- A series of masks are generated that will be most successful in cracking the highest percentage of passwords
In a ____ ____, the attacker creates digests of common dictionary words and compares against a stolen digest file
____ ___ is the search for any two digests that are the same
dictionary attack
Birthday attack
____ ____ attack is a dictionary attack that uses a set of dictionary words and compares it with the stolen digests
Pre-image
____ ___ create a large pregenerated data set of candidate digests
advantages over other attack methods
can be used ______
faster than _____ attacks
less ____ required
Rainbow tables
repeatedly
dictionary
memory
Using _________________ as candidate passwords is the foundation of cracking today
stolen password collections
__________ is a type of authentication where a user is using more than one type of authentication credential
mfa
A _____ ____holds information to be used as part of the authentication process
disadvantages
- _____ and_____ required
- can be _____
smart card
hardware and software
cloned
smart cards
Stealing the information is often done by a process called _______
skimming
_____________:
Synched with an authentication server where the code is generated from an
algorithm
▶ The code changes every 30 to 60 seconds
_________ is “event-driven” and changes when a specific event occurs
Time-based one-time password (TOTP)
HMAC-based one-time password (HOTP)
is using a smartphone for authentication secure
why
no
messages can be phished
malware
A ____ ____is a dongle that is inserted into the USB port or Lightning port or held near the endpoint
A feature of security keys is _____, which is a key pair that is “burned” into the security key during manufacturing and is specific to a device model.
- has certificates that chain to a root cert
security key
attestation
______ _____ uses a person’s unique physical characteristics for
authentication
Physiological biometrics
specialized biometric scanner
____ ___ uses the human retina as a biometric identifier
fingerprint scanners
____ fingerprint scanner takes a picture and compares with image on file
____ fingerprint scanner uses a small slit or opening
Retinal scanner
Static
Dynamic
other human characteristics that can be used for authentication
vein
gait/the way they walk
standard input devices
- ____ ___ uses a standard computer microphone to identify users based on the
unique characteristics of a person’s voice - An ____ ___ uses a standard webcam to identify the unique characteristics of the iris
- ____ ____ uses landmarks called nodal points on human faces for authentication
Voice recognition
iris scanner
Facial recognition
biometric disadvantages
______ of hardware
some amount of _____
The ____ ____ ___ (FAR) is the frequency at which imposters are accepted as genuine
* The ____ ___ ___ (FRR) is the frequency that legitimate users are
rejected
cost
error
false acceptance rate
false rejection rate
_____ biometrics relates to perception, thought process, and understanding of the
user
It is considered easier for the user to remember because it is based on user’s life
experiences
also called knowledge based authentication
_____ passwords
Cognitive
picture passwords
_____ biometrics authenticates by normal actions the user performs
a type of this is keystroke dynamics
- uses two variables
– dwell time - time to press and release key
–flight time - time between keystrokes
Behavioral
protecting password digests
____: consists of a random string that is used in hash algorithms
– add a random string a a password before it is hashed
–makes dictionary and brute force attacks much slower
key ______ - is a specialized password hash algorithm that is intentionally designed to be slower
algorithms:
salts
stretching
brypt and PBKDF2
The most critical factor in a strong password is ____
length
A ____ ___is a secure repository where users can store passwords (also known
as a password manager)
3 types
____ ___ are a secure hardware-based solution to store passwords
A ______________________is a removable external cryptographic device that
includes an onboard random number generator and key storage facility
password vault
- generators
- online vaults
- password management applications
Password keys
hardware security module (HSM)
__________uses one authentication credential to access multiple
accounts or applications
Single sign-on (SSO)
_____ was originally designed for remote dial-in access to a corporate network.
is typically a device such as a wireless AP that is responsible for sending
user credentials and connection parameters to the ______ server
RADIUS
________ is an authentication system developed at MIT
* It uses encryption and authentication for security
* Works like using a driver’s license to cash a check
Difficult to ____
* Contains information linking it to the user
* It lists ____
* ____ some future date
Kerberos
copy
restrictions
Expires
__________ is commonly used on UNIX devices that communicates by forwarding user
authentication information to a centralized server
TACACS